Holochain: An agent-centric distributed hash table security in smart IoT applications

S Gaba, H Khan, KJ Almalki, A Jabbari… - IEEE …, 2023 - ieeexplore.ieee.org
The accomplishment of blockchain has increased the focus on the various applications for
simplifying the confidentiality and transaction sanctuary using the decentralized architecture …

[PDF][PDF] Advancements in enhancing cyber-physical system security: Practical deep learning solutions for network traffic classification and integration with security …

S Gaba, I Budhiraja, V Kumar… - Mathematical Biosciences …, 2024 - aimspress.com
Traditional network analysis frequently relied on manual examination or predefined patterns
for the detection of system intrusions. As soon as there was increase in the evolution of the …

Federated learning based secured computational offloading in cyber-physical IoST systems

S Gaba, I Buddhiraja, V Kumar, A Makkar - International Conference on …, 2022 - Springer
In the past years, there has been fast growth in various applications which generates
penetrating and personal information dependent on the Internet of things (IoT). The …

Blockchain and autonomous vehicles: Architecture, security and challenges

A Aggarwal, S Gaba, J Kumar… - 2022 Fifth International …, 2022 - ieeexplore.ieee.org
In the smart culture where everything is going intelligently, there is a need to administer the
intelligent transport system and improve the traffic congestion, accidents on road accidents …

A modified approach for accuracy enhancement in intruder detection with optimally certain features

S Gaba, S Nagpal, A Aggarwal, S Kumar… - … Communications and 5G …, 2023 - Springer
Mobile ad-hoc networks are vibrant and incessantly varying ad-hoc networks, so having
centralized checking on the same is impossible. Vehicular ad-hoc network (VANET) is like …

Classification of vulnerabilities in cyber physical systems: Approach, security and challenges

A Gandhi, S Mehla, S Gaba, A Aggarwal… - Big Data Analytics in …, 2023 - Springer
Abstract Cyber Physical Systems are composed of mainly three processes: Networking,
Computation and Physical processes. Embedded computer system and networking system …

An optimized approach for intrusion detection in internet of softwarized things

S Gaba, A Nehra, I Budhiraja, V Kumar… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
In the past years, there has been fast growth in various applications which generates
penetrating and personal information dependent on the Internet of things (IoT). The …

Implementation of a Postpandemic Crowd Safety Provisioning Application

A AGGARWAL, S GABA - Global Digital Transformation and the …, 2024 - books.google.com
The universe has gone through the worst pandemics, and even now, the situ-ation is
unclear, and people face many consequences. No one has thought that this kind of …

Generating Synthetic Text using Generative Adversarial Networks

N Sahal, R Krishnamoorthy… - … Computing and Wireless …, 2024 - ieeexplore.ieee.org
Generative adverse Networks (GANs) are a class of deep learning architectures that
generate new facts primarily based on education records. Currently, GANs have been …

Implementation of a Postpandemic Crowd Safety Provisioning Application Using AI Methods

A Aggarwal, S Gaba - Global Digital Transformation and the Covid-19 … - taylorfrancis.com
The universe has gone through the worst pandemics, and even now, the situation is unclear,
and people face many consequences. No one has thought that this kind of pandemic would …